A company is implementing security measures for its cloud-based infrastructure. They want to ensure that only devices compliant with the company's security policies are able to access the network. Which solution would BEST fulfill this requirement?
Setting up a Virtual Private Network (VPN) for all remote device connections
Network access control that evaluates endpoint devices prior to allowing network access.
Configuration of VLANs to segregate the network and limit access to sensitive areas
Use of MAC address filtering to restrict network access to known device addresses
Implementing Access Control Lists (ACLs) on routers to restrict access to the network
Deployment of firewalls with strict inbound and outbound rules